Posts
3956
Following
731
Followers
1603
"I'm interested in all kinds of astronomy."
repeated

There's another LInux LPE (of course):
pintheft

Sadly, the RDS kernel module this requires is only default on Arch Linux among the common distributions we tested.

CVE unknown.

1
4
0
repeated

New blog post on "Proofs and Intuitions": On the Unreasonable Effectiveness of Property-Based Testing for Validating Formal Specifications.

https://proofsandintuitions.net/2026/05/18/property-based-testing-specifications/

The gist: randomised testing can validate formal specs. It's very cheap and powerful: we found bugs in specs of VERINA and CLEVER benchmarks.

0
3
0
repeated

Today is L0pht Day. In 1998 7 hackers in suits told the US Senate the internet was a house of cards. We said we could take it down in 30 minutes. They looked at us like we'd landed from another planet.

28 yrs later, the gap between what the security community knows and what decision-makers act on remains a fundamental problem.

Miss you, Peter Neumann. He testified that day too, with decades of hard-earned wisdom. We owe him.

The work isn't done. It never was.

6
12
0
repeated

You probably not gonna like this, yet somewhat might have anticipated...

We are seeing a stark influx in requests to audit vibe-coded cryptography.

So, vibe-crypto is a thing and will be one for a while.

Do what now?

5
3
0
repeated

As promised - full blog post is live for CVE-2026-40369
Covers everything: initial research, methodology, the exploitation path, caveats, cleanups, etc. The whole journey from finding it to production-grade exploit:

https://pwn2nimron.com/blog
https://bird.makeup/users/orinimron123/statuses/2054672170068918348

0
5
0
repeated

Count Dracula was 412 when he moved to England in search of new blood.

Sauron was 54,000 years old when he forged The One Ring.

Cthulhu had seen galaxies flare
into life and fade to darkness before he put madness in the minds of men.

It's never too late to follow your dreams!

1
26
1
repeated

New blog post: Vulnerability Spotlight - CVE-2023-32692.

Learn about the remote code execution vulnerability in CodeIgniter4 and try out our Dev-Container based test environment to follow along!

https://mogwailabs.de/en/blog/2026/05/vulnerability-spotlight-cve-2023-32692/

0
2
0
repeated

DOMPurify XSS via `selectedcontent` re-clone

https://github.com/cure53/DOMPurify/security/advisories/GHSA-87xg-pxx2-7hvx

This is one of the most interesting bypasses we have seen in a long time, and it feels that this new HTML element will cause lots of trouble in the future.

0
4
0
[RSS] The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long-Ignored Attack Surface

https://www.darknavy.org/blog/the_biometric_authtoken_heist/
0
0
0
[RSS] Instrumenting QT6 desktop apps with Frida - Part 1

https://blog.samanl33t.com/writings/0x0003-frida-on-qt6-part-1/
0
0
0
[RSS] Hack the Elephant One Bite at a Time: JPEG-Related Memory-Safety Bugs in PHP

https://swarm.ptsecurity.com/hack-the-elephant-one-bite-at-a-time-jpeg-related-memory-safety-bugs-in-php/
0
0
0
[RSS] HDD Firmware Hacking Part 1

https://icode4.coffee/?p=1465
0
0
3
[RSS] Exploiting Toshiba Qiomem.sys vulnerable driver

https://valium007.github.io/posts/toshiba-vuln/
0
0
0
repeated

The Nightmare-Eclipse repo clearly credits James Forshaw with the CVE-2020-17103 vulnerability that MiniPlasma is based off of.

Did Nightmare-Eclipse modify MiniPlasma to use a variant of CVE-2020-17103 that still works on modern Windows, which surely contains the fix?

NO. MiniPlasma IS the poc from the GPZ write-up, but with a minor tweak to do something (LPE).

Why does it work on current Windows?
Well, instead of fixing CVE-2020-17103, they decided to break the PoC instead. And yeah, with Win10 Dec 2020 and Win11 RTM, the GPZ PoC doesn't work.

But somewhere between Win11 RTM and 22H2 (I have neither the VM snapshots nor the patience to determine when exactly), whatever thing Microsoft did to break the CVE-2020-17103 PoC regressed. An because it wasn't a fix, then surely Microsoft had no regression test to detect that the fix was no longer present.

So here we are. MiniPlasma is the GPZ PoC, but modified slightly to achieve LPE by way of Volatile Environment and wermgr.exe instead of creating DEMODEMO in the registry.

Since Microsoft didn't bother fixing CVE-2020-17103, will CVE-2020-17103 simply be updated with the MiniPlasma recognition that it wasn't actually fixed in December 2020? Get real. This will surely get a new CVE, as CVEs are for Microsoft updates, not vulnerabilities. 😂

0
8
0
repeated
hi everyone

given one #bitlocker #0day is already out there, here's my own bitlocker 0day, I added it to my repo listing bitlocker attacks.

Introducing "ram leak": https://github.com/Wack0/bitlocker-attacks#ram-leak

As we all know, the boot environment allows booting from a ramdisk. This involves loading a file from disk into RAM, as expected.

However, "file" and "disk" can be arbitrarily chosen, and "disk" being a BitLocker encrypted partition is a supported scenario. Using another trick (same one used with bitpixie earlier) it's possible to get the keys derived without going through the legacy integrity validation checks too if relevant.

You can see where this is going. It's possible to leak any file from a bitlocker encrypted OS partition into RAM as long as you can get the keys derived (ie, TPM-only scenario).

The catch is that booting into the NT kernel marks that memory area as free so it could get overwritten there, but there are other ways to dump the memory area, and a PoC is included with my preferred method (it's only a PoC so just displays a hexdump of the first sector of the file)

The video shows successful exploitation in my test VM, it has secure boot enabled (you can tell because VMware shows an efi shell option on the boot menu when secure boot is disabled).

#infosec #windows
0
23
0
repeated
Show older